Bug 1921428 (CVE-2021-26927) - CVE-2021-26927 jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c
Summary: CVE-2021-26927 jasper: NULL pointer dereference in jp2_decode() in jp2_dec.c
Alias: CVE-2021-26927
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1922492 1922493 1922494 1933860 1933861
Blocks: 1921429 1926851
TreeView+ depends on / blocked
Reported: 2021-01-28 00:58 UTC by Pedro Sampaio
Modified: 2022-05-17 10:26 UTC (History)
8 users (show)

Fixed In Version: jasper 2.0.25
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2021-11-10 02:21:49 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:4235 0 None None None 2021-11-09 17:52:02 UTC

Description Pedro Sampaio 2021-01-28 00:58:03 UTC
A flaw was found in jasper. A null pointer dereference in jp2_decode in jp2_dec.c may lead to program crash and denial of service.

Upstream issue:


Upstream patch:


Comment 1 Tomas Hoger 2021-01-29 21:45:52 UTC
Public now via upstream bug report:


Comment 3 Tomas Hoger 2021-01-29 21:53:07 UTC
Created jasper tracking bugs for this issue:

Affects: fedora-all [bug 1922494]

Created mingw-jasper tracking bugs for this issue:

Affects: fedora-all [bug 1922493]

Comment 6 Tomas Hoger 2021-03-23 16:26:17 UTC
Note that the fist Jasper version that crashes with the reproducer included in the upstream bug report is 2.0.20.  However, the problem exists in earlier versions as well.  More detailed analysis can be found in the upstream issue:


Comment 8 errata-xmlrpc 2021-11-09 17:51:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2021:4235 https://access.redhat.com/errata/RHSA-2021:4235

Comment 9 Product Security DevOps Team 2021-11-10 02:21:47 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Note You need to log in before you can comment on or make changes to this bug.